Cisco Systems OL-6109-01 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Cisco Systems OL-6109-01, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Cisco Systems OL-6109-01 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Cisco Systems OL-6109-01. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Cisco Systems OL-6109-01 should contain:
- informations concerning technical data of Cisco Systems OL-6109-01
- name of the manufacturer and a year of construction of the Cisco Systems OL-6109-01 item
- rules of operation, control and maintenance of the Cisco Systems OL-6109-01 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Cisco Systems OL-6109-01 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Cisco Systems OL-6109-01, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Cisco Systems service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Cisco Systems OL-6109-01.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Cisco Systems OL-6109-01 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    CH A P T E R 4-1 Cisco Traffic Anomaly Dete ctor User Guide OL-6109-01 4 Zone Configuration This chapter describes zone confi guration. It includes the foll owi ng major sections: • Basic Zone Conf iguration • Zone Remote Guard List • Zone Traf f ic Learning • Zone Detection Basic Zone Configuration This section describes the ini tial Zone [...]

  • Page 2

    Chapter 4 Z one Configuration Basic Zone Configur ation 4-2 Cisco Traffic Anomaly De tector User Guide OL-6109-01 • Removing a Zone IP Address • Removing all Zo ne IP Addresses Defining a New Zone The Detector enables the us er to define a ne w zone based on a vari ety of templates. T o defi ne a ne w zone perform the followi ng: 1. From the Co[...]

  • Page 3

    4-3 Cisco Traffic Anomaly Dete ctor User Guide OL-6109-01 Chapter 4 Zone Configuration Basic Zone Configuration Note If no zone template is specif ied, the zone will be defined u sing the Detector DEF A UL T zone template. – base-zone-name —(Optional) Th e name of a desired zone used as a template for the ne w zone. – interactive —(Optional[...]

  • Page 4

    Chapter 4 Z one Configuration Basic Zone Configur ation 4-4 Cisco Traffic Anomaly De tector User Guide OL-6109-01 2. Choose ENTER . The following prompt appears: admin@DETECTOR–conf-zone-<new-zone-name># T o duplicate a zone from the zone command group lev el perform the follo wing: 1. From the Zone command gr oup le vel of the desired zone[...]

  • Page 5

    4-5 Cisco Traffic Anomaly Dete ctor User Guide OL-6109-01 Chapter 4 Zone Configuration Basic Zone Configuration Removing All Zones The user may remov e all the D etector’ s zones. Caution Removing all zones eliminates their DDoS detection. T o remov e all zones perform the follo wing: 1. From the Conf iguration command group le vel type the fol l[...]

  • Page 6

    Chapter 4 Z one Configuration Basic Zone Configur ation 4-6 Cisco Traffic Anomaly De tector User Guide OL-6109-01 Where: – template-name —A zone template. Options i nclude: Default —The Guard default zone template LINK_128K —A template designed fo r bandwidth-limited Links LINK_1M —A template designed for bandwidth-limited Links LINK_4M ?[...]

  • Page 7

    4-7 Cisco Traffic Anomaly Dete ctor User Guide OL-6109-01 Chapter 4 Zone Configuration Basic Zone Configuration Where zone-name specifies the desired zone name. 2. Choose ENTER . Below is an e xample of the zone command implementation: admin@DETECTOR-conf# zone scannet admin@DETECTOR-conf-zone-scannet# Describing a Zone The user may add a descripti[...]

  • Page 8

    Chapter 4 Z one Configuration Basic Zone Configur ation 4-8 Cisco Traffic Anomaly De tector User Guide OL-6109-01 – ip-mask —(Optional) The zone IP subnet mask. Note If no mask is s pecified, the Detect or assumes th e default subnet mask 255.255.255.255. 2. Choose ENTER . Below is an e xample of the ip address command implemen tation: admin@DE[...]

  • Page 9

    4-9 Cisco Traffic Anomaly Dete ctor User Guide OL-6109-01 Chapter 4 Zone Configuration Zone Remote Guard List Note If no mask is s pecified, the Detect or assumes th e default subnet mask 255.255.255.255. 2. Choose ENTER . Below is an example of the no ip address co mmand implemen tation: admin@DETECTOR-conf-zone-scannet# no ip address 192.168.100.[...]

  • Page 10

    Chapter 4 Z one Configuration Zone Remote Guar d List 4-10 Cisco Traffic Anomaly De tector User Guide OL-6109-01 This section contains the following procedures: • Adding a Guard to the Zone Remo te Guard List • Removing a Guard from the Zone Remote Guard List • Interacti ve Recommendations Mode Adding a Guard to the Zone Remote Guard List The[...]

  • Page 11

    4-11 Cisco Traffic Anomaly Dete ctor User Guide OL-6109-01 Chapter 4 Zone Configuration Zone Remote Guard List Where remote-guard-address specifies the remote Guard IP address. Use ‘*’ to remov e all remote Guards from the remote Guard li st. Caution The user should verify that the Detector has at least one remote Guard on it s default remot e [...]

  • Page 12

    Chapter 4 Z one Configuration Zone Traffic Learning 4-12 Cisco Traffic Anomaly De tector User Guide OL-6109-01 T o create a ne w zone with interacti ve recommendations mod e perform the follo wing: 1. From the Conf iguration command group le vel type the fol low ing: admin@DETECTOR-conf# zone < new-zone-name > interactive 2. Choose ENTER . Th[...]

  • Page 13

    4-13 Cisco Traffic Anomaly Dete ctor User Guide OL-6109-01 Chapter 4 Zone Configuration Zone Traffic Learning The Detector’ s tools for constructing detection policies are the Polic y T emplates. These define the policies according to the Minimum Threshold and Maximum Services parameters the user pro vides (t his chapter will not cov e r those ad[...]

  • Page 14

    Chapter 4 Z one Configuration Zone Traffic Learning 4-14 Cisco Traffic Anomaly De tector User Guide OL-6109-01 Where zone-name specifies a zone name. Note that the Guard enables the use of an asteri sk (*) as a wildcard denoting either of the follo wing options: – All of the Guard’ s zones. Issuing learning policy-const ruction* means setting t[...]

  • Page 15

    4-15 Cisco Traffic Anomaly Dete ctor User Guide OL-6109-01 Chapter 4 Zone Configuration Zone Traffic Learning Accepting Learning Phase 1 – Policy Construction The user may accept the Detector’ s suggested policies. T o accept the results of the initial Po licy Construction phase perform the follo wing: 1. From the Global command gro up level ty[...]

  • Page 16

    Chapter 4 Z one Configuration Zone Traffic Learning 4-16 Cisco Traffic Anomaly De tector User Guide OL-6109-01 Note that the Detector enables the us e of an asterisk (*) as a wildcard denoting either of th e following opt ions: – All of the Detector’ s zones. Issuing no lear ning* reject means abort ing the learning phase for all o f the Detect[...]

  • Page 17

    4-17 Cisco Traffic Anomaly Dete ctor User Guide OL-6109-01 Chapter 4 Zone Configuration Zone Traffic Learning Terminating Learning Phase 2 – Threshold Tuning After a suf ficient period of time (see th e above note) the user ends the Threshol d T uning phase. The user may accept the Detect or’ s suggested policies or decide to abort the second p[...]

  • Page 18

    Chapter 4 Z one Configuration Zone Traffic Learning 4-18 Cisco Traffic Anomaly De tector User Guide OL-6109-01 Aborting Learning Phas e 2 – Tuning Threshold The user may wish to abort the second phase of learning procedure. In this case the Detector stops the process and erases the data learned on the second phase . The data gathered on the first[...]

  • Page 19

    4-19 Cisco Traffic Anomaly Dete ctor User Guide OL-6109-01 Chapter 4 Zone Configuration Zone Detection 2. Choose ENTER . The follo wing (partial sample) screen appears: admin@DETECTOR-conf-zone-scannet# show policies statistics Key Rate Policy 192.168.100.34 73.17 http/80/analysis/syns/dst_ip N/A 0.17 http/80/analysis/syns/global Key Ratio Policy 1[...]

  • Page 20

    Chapter 4 Z one Configuration Zone Detection 4-20 Cisco Traffic Anomaly De tector User Guide OL-6109-01 Note that the Detector enables the us e of an asterisk (*) as a wildcard denoting either of th e following opt ions: – All of the Detector’ s zones. Issuing detect * means be ginning detection for all of the Detector’ s zones. – A wildcar[...]

  • Page 21

    4-21 Cisco Traffic Anomaly Dete ctor User Guide OL-6109-01 Chapter 4 Zone Configuration Zone Detection Where: – all-zone —The Detector activ ates the Guard to assume protection over the overall zone whene ver a traff ic abnormality is detected (see this section’ s explanation for further details). – only-dest-ip —The Detector acti vates t[...]

  • Page 22

    Chapter 4 Z one Configuration Zone Detection 4-22 Cisco Traffic Anomaly De tector User Guide OL-6109-01 The sample screen indicates that zone tr aff ic is mirrored (or split), the Detector receiv es the zone’ s traff ic and the traff i c shows normal flo w fluctuations. Zone detection is functio ning properly . Ending the Zone Detection The user [...]